Page 218 - Asterisk™: The Future of Telephony
P. 218

Future
               SIP has earned its place as the protocol that justified VoIP. All new user and enterprise
               products are expected to support SIP, and any existing products will now be a tough
               sell unless a migration path to SIP is offered. SIP is widely expected to deliver far more
               than VoIP capabilities, including the ability to transmit video, music, and any type of
               real-time multimedia. While its use as a ubiquitous general-purpose media transport
               mechanism seems doubtful, SIP is unarguably poised to deliver the majority of new
               voice applications for the next few years.

               Security considerations
               SIP uses a challenge/response system to authenticate users. An initial INVITE is sent to
               the proxy with which the end device wishes to communicate. The proxy then sends
               back a 407 Proxy Authorization Request message, which contains a random set of
               characters referred to as a nonce. This nonce is used along with the password to generate
               an MD5 hash, which is then sent back in the subsequent INVITE. Assuming the MD5
               hash matches the one that the proxy generated, the client is then authenticated.
               Denial of Service (DoS) attacks are probably the most common type of attack on VoIP
               communications. A DoS attack can occur when a large number of invalid INVITE re-
               quests are sent to a proxy server in an attempt to overwhelm the system. These attacks
               are relatively simple to implement, and their effects on the users of the system are
               immediate. SIP has several methods of minimizing the effects of DoS attacks, but ulti-
               mately they are impossible to prevent.
               SIP implements a scheme to guarantee that a secure, encrypted transport mechanism
               (namely Transport Layer Security, or TLS) is used to establish communication between
               the caller and the domain of the callee. Beyond that, the request is sent securely to the
               end device, based upon the local security policies of the network. Note that the en-
               cryption of the media (that is, the RTP stream) is beyond the scope of SIP itself and
               must be dealt with separately.
               More information regarding SIP security considerations, including registration hijack-
               ing, server impersonation, and session teardown, can be found in Section 26 of SIP RFC
               3261.

               SIP and NAT
               Probably the biggest technical hurdle SIP has to conquer is the challenge of carrying
               out transactions across a NAT layer. Because SIP encapsulates addressing information
               in its data frames, and NAT happens at a lower network layer, the addressing infor-
               mation is not automatically modified and, thus, the media streams will not have the
               correct addressing information needed to complete the connection when NAT is in
               place. In addition to this, the firewalls normally integrated with NAT will not consider
               the incoming media stream to be part of the SIP transaction, and will block the con-
               nection. Newer firewalls and Session Border Controllers are SIP-aware, but this is still


               190 | Chapter 8: Protocols for VoIP
   213   214   215   216   217   218   219   220   221   222   223